Leaky mobile apps: 

What you need to know
July	19th,	2017
About	Me
• Jon	Porter	of	House	NowSecure	-	Mobile	app	
security	software	company	
• Enthusiast	of	Mobile	Security	/	Senior	SE	
• BA	Comp	Sci	/	MS	Info	Sec	
• Solver	of	the	Rubik’s	Cube(s)	
• Drinker	of	1000	beers	(1229	to	be	exact)
• The	mobile	security	problem	
• The	state	of	mobile	app	security	
• 3-part	mobile	exploit	demo	
• What	can	we	do	about	it?
Agenda
THE	MOBILE	SECURITY	PROBLEM
MOBILE	DEVICES	HAVE	UNSEATED	PCS	
Source: Benedict Evans
SPENDING	MORE	TIME	WITH	MOBILE	APPS	THAN	DESKTOPS	
Source: Comscore by way of Benedict Evans
PRESSING	MOBILE	SECURITY	ISSUES
•	Apps	are	vulnerable	and	leaking	data	
•	Lack	of	administrative	access	to	devices		
•	Complex	ecosystem	
◦	OEMs	
◦ OS	developers,	carriers	
• Innovation	outpaces	security	practices	
• Legacy	security	strategies	are	ineffective	
(“bolted	on”)	
Typical	security	defenses	fail	in	mobile	se4ngs	because	
they	protect	boundaries	rather	than	the	informa7on	
itself,	and	mobile	users	do	not	respect	tradi7onal	
boundaries.
Gartner
VULNERABILITIES	IN	ANDROID	AND	IOS
Life[me	Android	CVEs	by	type	(130	in	2015)	 Life[me	iOS	CVEs	by	type	(375	in	2015)	
Source: CVE DetailsSource: CVE Details
MOBILE	DATA	IS	VALUABLE	AND	A	MARKET	FOR	COMPROMISE	
EXISTS		 •	 Governments	
	 ◦	 Legi[mate	need	
	 ◦	 Legal	framework	
	 ◦	 Willingness	to	pay	for	it	
	 •	 Hacking	Team	weaponizes	mobile	
security	flaws	for	surveillance	
	 •	 Zerodium	
	 ◦	 Sells	zero-day	exploits	
	 ◦	 Offers	$1	million	for	iOS	
jailbreaks	
	 •	 Malicious	actors	willing	to	pay	
	 ◦	 Oppressive	regimes	
	 ◦	 Rogue	states
THE	ULTIMATE	SURVEILLANCE	TOOL?
Apps	can:	
	 •	 Read	precise	loca[on	
	 •	 Read	phone	logs	
	 •	 Read	SMS	
	 •	 Record	audio	
	 •	 Use	camera	
	 •	 Start	on	boot	
	 •	 Connect	to	Internet
THE	STATE	OF	MOBILE

APPLICATION	SECURITY
We	tested	
400K	Apps
Source - 2016 NowSecure Mobile Security Report
25%		
of	mobile	apps	have	at	least	one	

high	risk	security	or	privacy	flaw
HIGH	RISK	ISSUES	EXIST	WITHIN	EACH	APP	CATEGORY	
Source - 2016 NowSecure Mobile Security Report
Gaming	apps:	 Business	apps:	 Social	apps:	
1.5x	 3x	 4x	
more	likely	to	include	a	
high	risk	vulnerability
more	likely	to	leak	
login	creden[als
more	likely	to	leak	login	
creden[als	or	email	address
HIGH	RISK	ISSUES	IN	APPS	WITH	MORE	THAN	1M	DOWNLOADS	
Source - 2016 NowSecure Mobile Security Report
LEAKY	APPS	AND	SOCIAL	ENGINEERING
Source - 2016 NowSecure Mobile Security Report
	 •	 Informa[on	leaked	can	prove	valuable	to	akackers	
	 •	 Reconnaissance	for	targeted	social	engineering	schemes	
	 •	 E.g.,		creden[als	leaked	by	a	produc[vity	app	
	 ◦	 Might	grant	an	akacker	access	to	a	cache	of	sensi[ve	informa[on	
	 ◦	 Usernames	
	 ◦	 GPS	loca[on	
	 ◦	 Unlock	other	sensi[ve	informa[on	about	a	user
EXAMPLES
Remote	Akack	Surface
	 •	 Vungle	provides	in-app	video	adver[sing	
	 •	 App	library	serves	>200M	ads	each	month		
	 •	 Remote	code	execu[on	
	 •	 Data	about	the	device	and	the	user	from	the	app	
EXAMPLE:


“Vungle	products	provide	necessary	
infrastructure	for	app	mone7za7on	through	
video	ads.	More	than	200	million	people	
worldwide	see	Vungle	ads	each	month.”

POPULAR	APP	USING	VUNGLE
Remote	Akack	Surface
	 •	 SDK	downloads	a	zip	file	over	hkp	without	TLS	
or	verifica[on	
	 •	 Create	a	.dex	file	that	contains	code	you	want	
to	execute	
	 •	 Add	the	.dex	to	the	requested	zip	file,	modify	
the	network	response	and,	you	can	gain	
remote	code	execu[on

EXAMPLE:
“An	integrated	mobile	adver7sing	plaEorm	
enabling	adver7ser	to	op7mize	ad	efficiency	and	
app	developer	to	acquire	the	highest	media	
benefit.	“

DEX
ADLIBR	SCALE
POPULAR	APP	USING	ADLIB
	 •	 A	network-based	akacker	can	
modify	traffic	to	gain	control	of	
the	device	due	to	a	flaw	in	
Adlibr	SDK

	 •	 The	akacker	can	access	current	
app	data,	world	accessible	data	
and	chain	with	an	exploit	to	
gain	elevated	permissions
SAMPLE	DATA	LEAKED	(HTTP)
	 •	 Many	ad	networks	send	data	in	
clear,	including	geoloca[on	
	 •	 ID	derived	from	hardware	can	
be	tracked	across	[me	and	
loca[ons	
	 •	 App	pkg	is	iden[fied,	enabling	
akacker	to	find	target
imei=352584060111000
mac=f8:a9:c2:4f:f3:80
androidid=88c8584b54bd9c00
serial=062f2dfb344be87b
conn=wifi
country=US
dm=Nexus+5
dv=Android4.4.2
lat=41.83720397949219
long=-87.9613037109375
mcc=310
mnc=410
mmdid=mmh_AC78B68BD2E528CC0FC78AFB342E58CF
_9099A5181F956FCAFB4AC9946DF71CCACB322F59
root=0
pkid=com.ismaker.android.simsimi
pknm=SimSimi
plugged=true
sdkversion=5.1.0-13.08.12.a
ua=Dalvik%2F1.6.0+
%28Linux%3B+U%3B+Android+4.4.2%3B+Nexus+5+
Build%2FKOT49H%29
DATA	DESTINATIONS	
Destination	address IP Country
ad.adlibr.com 211.236.244.152 KR
ad.doubleclick.net 173.194.33.156 US
ads.mp.mydas.mobi 216.157.12.18 US
adtg.widerplanet.com 117.52.90.81 KR
androidsdk.ads.mp.mydas.mobi 211.110.212.68 KR
ajax.googleapis.com 74.125.28.95 US
androidsdk.ads.mp.mydas.mobi 216.157.12.18 US
app.simsimi.com 54.235.200.56 US
astg.widerplanet.com 117.52.90.85 KR
bank81.mi.ads.mp.mydas.mobi 216.157.13.15 US
capp.simsimi.com 174.129.197.187 US
cdn.millennialmedia.com 96.17.8.146 US
d.appsdt.com 52.6.198.255 US
dcys-en.ijinshan.com 114.112.93.204 CN
landingpages.millennialmedia.co
m 216.157.12.21 US
mtab.clickmon.co.kr 114.207.113.177 KR
once.unicornmedia.com 192.33.167.222 US
rtax.criteo.com 74.119.117.100 US
INSECURE	MOBILE	APPS	CREATE	BUSINESS	RISK	FOR	
ENTERPRISES
Starbucks	
Thieves	siphoned	money	out	of	
users’	accounts	using	the	
mobile	app



via	USA	Today	
Ola	
India’s	largest	startup	with	
$1.1B	in	funding	was	hacked	to	
allow	unlimited	free	rides



via	The	Next	Web	
Hulu	and	Tinder	
App	vulnerabili[es	offered	
access	to	free	premium	
accounts	



via	CNBC
DEMO
PART	1:	CRITICAL	VULNERABILITY	IN	PRE-INSTALLED	KEYBOARD	
ON	SAMSUNG	DEVICES
	 •	 Combining	CVE-2015-4640	and	
CVE-2015-4641	
	 •	 Execute	arbitrary	code	in	a	privileged	context	
	 •	 Result:	silently	execute	malicious	code	on	
target	device	
	 •	 Es[mated	impact:	600	million	devices
DEMO
PART	2:	INSTALLING	A	MALICIOUS	APPLICATION
	 •	 Silently	installed	using	the	previous	exploit	
	 •	 Communicates	device/user	data	to	a	C&C	
server	
	 •	 Even	if	removed,	can	be	reinstalled	by	the	
akacker	
	 •	 The	UI	is	just	for	demo	purposes,	and	
would	not	be	required	if	using	this	in	the	
wild
DEMO
PART	3:	EXPOSING	LEAKY	APPS
	 •	 Escalate	to	root	privilege	using	another	
exploit	
	 •	 Use	the	root	permission	to	look	for	
vulnerable	applica[on	(or	all	applica[ons)	
	 •	 Compress	and	send	the	data	back	to	the	
C&C	server
DEMO
WHAT	CAN	WE	DO	ABOUT	IT?
TIPS	FOR	SECURING	YOUR	MOBILE	DEVICE
1.					Update	your	opera[ng	system	and	apps	when	new	versions	are	available.	 	
2.	 Add	a	passcode,	PIN,	or	pakern	lock.	
3.	 Use	different	passwords	for	sites	and	apps.	
4.	 Logout	of	your	applica[ons.	
5.	 Only	download	apps	from	the	official	App	Store	and	Google	Play.	
6.	 Use	two-factor	user	iden[fica[on	when	available.	
7.	 Know	what	data	is	being	collected	by	applica[ons.
OTHER	FREE	RESOURCES
1.					Secure	Mobile	Dev	Best	Prac[ces	 	
2.	 Mobile	App	Security	Program	Management	Handbook	
3.	 Mobile	Banking	Applica[ons:	Security	Challenges	for	Banks	
4.	 Mobile	Incident	Response	E-book
SPONSORED	OPEN	SOURCE	PROJECTS
1.					Frida	-	inject	JavaScript	to	explore	na[ve	apps	on	Windows,	macOS,	Linux,	
iOS,	Android,	and	QNX	
2.	 Radare	-	complete	framework	for	reverse-engineering	and	analyzing	
binaries

More Related Content

PDF
Vetting Mobile Apps for Corporate Use: Security Essentials
PDF
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
PPT
2010: Mobile Security - WHYMCA Developer Conference
PDF
Mobile Security for Smartphones and Tablets
PDF
2010: Mobile Security - Intense overview
PDF
Symantec Mobile Security Whitepaper June 2011
PDF
C0c0n 2011 mobile security presentation v1.2
PDF
New trends in Payments Security: NFC & Mobile
Vetting Mobile Apps for Corporate Use: Security Essentials
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
2010: Mobile Security - WHYMCA Developer Conference
Mobile Security for Smartphones and Tablets
2010: Mobile Security - Intense overview
Symantec Mobile Security Whitepaper June 2011
C0c0n 2011 mobile security presentation v1.2
New trends in Payments Security: NFC & Mobile

What's hot (20)

PDF
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
PDF
Building a Mobile Security Model
PDF
2015 Mobile Security Trends: Are You Ready?
PDF
2012 State of Mobile Survey Global Key Findings
PDF
Symantec Mobile Security Webinar
PDF
Mobile Security: The 5 Questions Modern Organizations Are Asking
PDF
Building secure mobile apps
PPTX
Cybersecurity Risks In the Mobile Environment
PPTX
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
PPTX
Mobile security
PDF
Mobile security - Intense overview
PDF
Mobile Security
PPTX
How Healthcare CISOs Can Secure Mobile Devices
PDF
2015 Cyber Security
PDF
IBM Mobile Analyzer Saves the Day
PPTX
Top 2016 Mobile Security Threats and your Employees
PDF
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
PPTX
The Future of Cybersecurity - October 2015
PPTX
2015 Cybercrime Trends – Things are Going to Get Interesting
PPTX
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Building a Mobile Security Model
2015 Mobile Security Trends: Are You Ready?
2012 State of Mobile Survey Global Key Findings
Symantec Mobile Security Webinar
Mobile Security: The 5 Questions Modern Organizations Are Asking
Building secure mobile apps
Cybersecurity Risks In the Mobile Environment
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
Mobile security
Mobile security - Intense overview
Mobile Security
How Healthcare CISOs Can Secure Mobile Devices
2015 Cyber Security
IBM Mobile Analyzer Saves the Day
Top 2016 Mobile Security Threats and your Employees
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
The Future of Cybersecurity - October 2015
2015 Cybercrime Trends – Things are Going to Get Interesting
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
Ad

Similar to Leaky Mobile Apps: What You Need to Know (20)

PDF
Five mobile security challenges facing the enterprise
PDF
5 Mobile App Security MUST-DOs in 2018
PDF
Debunking the Top 5 Myths About Mobile AppSec
PDF
It's not about you: Mobile security in 2016
PDF
The fundamentals of Android and iOS app security
PDF
How to scale mobile application security testing
PDF
Building a Mobile App Pen Testing Blueprint
PDF
Mobile App Security Predictions 2019
PDF
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
PDF
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
PDF
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
PDF
Top OSS for Mobile AppSec Testing: The Latest on R2 and FRIDA
PDF
Preparing for the inevitable: The mobile incident response playbook
PDF
Next-level mobile app security: A programmatic approach
PDF
Unicom Conference - Mobile Application Security
PDF
iOS and Android security: Differences you need to know
PDF
Android App Hacking - Erez Metula, AppSec
PDF
Mobile Defense-in-Dev (Depth)
PDF
How to Build Secure Mobile Apps.pdf
PDF
Mobile Application Penetration Testing: Ensuring the Security of Your Apps
Five mobile security challenges facing the enterprise
5 Mobile App Security MUST-DOs in 2018
Debunking the Top 5 Myths About Mobile AppSec
It's not about you: Mobile security in 2016
The fundamentals of Android and iOS app security
How to scale mobile application security testing
Building a Mobile App Pen Testing Blueprint
Mobile App Security Predictions 2019
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
Top OSS for Mobile AppSec Testing: The Latest on R2 and FRIDA
Preparing for the inevitable: The mobile incident response playbook
Next-level mobile app security: A programmatic approach
Unicom Conference - Mobile Application Security
iOS and Android security: Differences you need to know
Android App Hacking - Erez Metula, AppSec
Mobile Defense-in-Dev (Depth)
How to Build Secure Mobile Apps.pdf
Mobile Application Penetration Testing: Ensuring the Security of Your Apps
Ad

More from NowSecure (19)

PDF
iOS recon with Radare2
PDF
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
PDF
Android Q & iOS 13 Privacy Enhancements
PDF
OSS Tools: Creating a Reverse Engineering Plug-in for r2frida
PDF
Jeff's Journey: Best Practices for Securing Mobile App DevOps
PDF
A Risk-Based Mobile App Security Testing Strategy
PDF
Android P Security Updates: What You Need to Know
PDF
iOS 12 Preview - What You Need To Know
PDF
5 Tips for Agile Mobile App Security Testing
PDF
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
PDF
What attackers know about your mobile apps that you don’t: Banking & FinTech
PDF
Solving for Compliance: Mobile app security for banking and financial services
PDF
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
PDF
Cybersecurity Fundamentals for Bar Associations
PDF
How Android and iOS Security Enhancements Complicate Threat Detection
PDF
Mobile Penetration Testing: Episode III - Attack of the Code
PDF
Mobile Penetration Testing: Episode II - Attack of the Code
PDF
Mobile Penetration Testing: Episode 1 - The Forensic Menace
PDF
OWASP Mobile Top 10
iOS recon with Radare2
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
Android Q & iOS 13 Privacy Enhancements
OSS Tools: Creating a Reverse Engineering Plug-in for r2frida
Jeff's Journey: Best Practices for Securing Mobile App DevOps
A Risk-Based Mobile App Security Testing Strategy
Android P Security Updates: What You Need to Know
iOS 12 Preview - What You Need To Know
5 Tips for Agile Mobile App Security Testing
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
What attackers know about your mobile apps that you don’t: Banking & FinTech
Solving for Compliance: Mobile app security for banking and financial services
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Cybersecurity Fundamentals for Bar Associations
How Android and iOS Security Enhancements Complicate Threat Detection
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode 1 - The Forensic Menace
OWASP Mobile Top 10

Recently uploaded (8)

PPTX
Social Media People PowerPoint Templates.pptx
PDF
Best 4 Sites for Buy Verified Cash App Accounts – BTC Only.pdf
PPTX
The-Literary-Elements in non fiction creative
PDF
2025 Guide to Buy Verified Cash App Accounts You Can Trust.pdf
PDF
Kids, Screens & Emotional Development by Meenakshi Khakat
PDF
Top 10 Platforms for Securely Buying Verified Cash App Accounts.pdf
PDF
Date Right Stuff - Invite only, conservative dating app
DOC
EIU毕业证学历认证,贝尔维尤学院毕业证国外毕业证
Social Media People PowerPoint Templates.pptx
Best 4 Sites for Buy Verified Cash App Accounts – BTC Only.pdf
The-Literary-Elements in non fiction creative
2025 Guide to Buy Verified Cash App Accounts You Can Trust.pdf
Kids, Screens & Emotional Development by Meenakshi Khakat
Top 10 Platforms for Securely Buying Verified Cash App Accounts.pdf
Date Right Stuff - Invite only, conservative dating app
EIU毕业证学历认证,贝尔维尤学院毕业证国外毕业证

Leaky Mobile Apps: What You Need to Know